Proceedings ArticleDOI
A new secure and efficient scheme of ADPCM encoder based on chaotic encryption
Mimoun Hamdi,Houcemeddine Hermassi,Rhouma Rhouma,Safya Belghith +3 more
- pp 7-11
TLDR
A new secure variant of ADPCM encoders that are adopted by the CCITT as Adaptive Differential Pulse Code Modulation is presented, which provides encryption and decryption of voice simultaneously with operationsADPCM encoding and decoding.Abstract:
This paper presents a new secure variant of ADPCM encoders that are adopted by the CCITT as Adaptive Differential Pulse Code Modulation. This version provides encryption and decryption of voice simultaneously with operations ADPCM encoding and decoding. The evaluation of the scheme showed better performance in terms of speed and security.read more
Citations
More filters
Journal Article
A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables
M. Hamdi,R. Rhouma,S. Belghith +2 more
TL;DR: A very simple and efficient pseudo random number generator (PRNG) based on chaotic maps and S-Box tables is presented, possessing excellent statistical and cryptographic properties.
Journal ArticleDOI
An appropriate system for securing real-time voice communication based on ADPCM coding and chaotic maps
TL;DR: The evaluation and simulation analysis indicate that the proposal possesses an excellent statistical and cryptographic properties; it provides low correlation between adjacent samples in encryption speech, extremely sensitive encryption keys and has a large key space which is sufficient to protect against brute-force attack.
Proceedings ArticleDOI
Designing a Generator of Random Electronic Message Based on Chaotic Algorithm
TL;DR: Algorithms on the basis of nonlinear systems with dynamic chaos are developed and investigated chaotic algorithms with high reliability of data mining for the generation of random electronic messages are investigated.
Book ChapterDOI
Implementation of Confidentiality for Voice Traffic
TL;DR: This system can provide better security when the security measures provided by the service provider are compromised, and can also be used to provide confidently in Bluetooth networks.
References
More filters
Book
Chaos: An Introduction to Dynamical Systems
TL;DR: One-dimensional maps, two-dimensional map, fractals, and chaotic attraction attractors have been studied in this article for state reconstruction from data, including the state of Washington.
Book
Chaos, Fractals, and Noise: Stochastic Aspects of Dynamics
Andrzej Lasota,Michael C. Mackey +1 more
TL;DR: A treatment of a variety of mathematical systems generating densities, ranging from one-dimensional discrete time transformations through continuous time systems described by integro-partial differential equations, can be found in this paper.
Book
Chaos and Nonlinear Dynamics: An Introduction for Scientists and Engineers
TL;DR: The phenomenology of chaos Towards a theory of nonlinear dynamics and chaos Quantifying chaos Special topics Appendices Index
Journal ArticleDOI
Cryptography with chaos
TL;DR: It is possible to encrypt a message using the ergodic property of the simple low-dimensional and chaotic logistic equation, in order to transfer the trajectory from an initial condition towards an ϵ-interval inside the logistic chaotic attractor.